www.underlineabuse.sa.com
Open in
urlscan Pro
172.67.211.19
Public Scan
Effective URL: https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6s...
Submission: On May 07 via api from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on May 1st 2024. Valid for: 3 months.
This is the only time www.underlineabuse.sa.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 172.67.211.19 172.67.211.19 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::2008 | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.17.3.184 104.17.3.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.2.184 104.17.2.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 5 |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
sa.com
www.underlineabuse.sa.com |
227 KB |
2 |
cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 4500 |
14 KB |
1 |
googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 39 |
73 KB |
17 | 3 |
Domain | Requested by | |
---|---|---|
11 | www.underlineabuse.sa.com |
www.underlineabuse.sa.com
|
2 | challenges.cloudflare.com |
www.underlineabuse.sa.com
challenges.cloudflare.com |
1 | www.googletagmanager.com |
www.underlineabuse.sa.com
|
17 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
underlineabuse.sa.com GTS CA 1P5 |
2024-05-01 - 2024-07-30 |
3 months | crt.sh |
*.google-analytics.com GTS CA 1C3 |
2024-04-16 - 2024-07-09 |
3 months | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq
Frame ID: B4094C669DE497A3BAF69A4DFD6BD414
Requests: 16 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/i9mns/0x4AAAAAAADnOjc0PNeA8qVm/light/normal
Frame ID: C5DCD8743E8B8FFF2CE3509105CCDBCA
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Nur einen Moment…Page URL History Show full URLs
-
http://www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bci...
HTTP 307
https://www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bci... Page URL
- https://www.underlineabuse.sa.com/offer.php?id=155&sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2... Page URL
-
http://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0j...
HTTP 307
https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0j... Page URL
- https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0j... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Google Tag Manager (Tag Managers) Expand
Detected patterns
- googletagmanager\.com/gtag/js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq
HTTP 307
https://www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq Page URL
- https://www.underlineabuse.sa.com/offer.php?id=155&sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq Page URL
-
http://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq
HTTP 307
https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq Page URL
- https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq HTTP 307
- https://www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq
- http://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq HTTP 307
- https://www.underlineabuse.sa.com/clicks/bpage/BioVanish.php?sid=1033299&h=1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
2_bcin_wb6sxfs4nef7qtqiqqv8ktuwiicr1io1nz9azwejcqpgdkmofhuhm5hwq
www.underlineabuse.sa.com/yiskldvj/rjtqjxvh3926nilqk/1ke4c6crzaoobf18ea6cfw3z7xphxrjye0jvcknuva8/ Redirect Chain
|
1 KB 881 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-1.11.0.min.js
www.underlineabuse.sa.com/ |
94 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js
www.googletagmanager.com/gtag/ |
203 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
offer.php
www.underlineabuse.sa.com/ |
364 B 674 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
BioVanish.php
www.underlineabuse.sa.com/clicks/bpage/ Redirect Chain
|
16 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
www.underlineabuse.sa.com/ |
1 KB 522 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v1
www.underlineabuse.sa.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/ |
388 KB 155 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
challenges.cloudflare.com/turnstile/v0/b/ce7818f50e39/ |
42 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
www.underlineabuse.sa.com/ |
1 KB 0 |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
dfc77143-f760-4f1f-802b-cf565dc5f20a
https://www.underlineabuse.sa.com/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
ebf015cfe22c715
www.underlineabuse.sa.com/cdn-cgi/challenge-platform/h/b/flow/ov1/721565294:1715117196:evqTj5kw723dgFFpoDIX2A5B2GTf8ucCVBldCCurJOU/88049311ba7d3a60/ |
15 KB 16 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
normal
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/i9mns/0x4AAAAAAADnOjc0PNeA8qVm/light/ Frame C5DC |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
d54eb754-3f25-49f2-867b-e780c7e0c54f
https://www.underlineabuse.sa.com/ |
80 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
www.underlineabuse.sa.com/ |
1 KB 0 |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
ebf015cfe22c715
www.underlineabuse.sa.com/cdn-cgi/challenge-platform/h/b/flow/ov1/721565294:1715117196:evqTj5kw723dgFFpoDIX2A5B2GTf8ucCVBldCCurJOU/88049311ba7d3a60/ |
2 KB 3 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
BioVanish.php
www.underlineabuse.sa.com/clicks/bpage/ |
17 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
v1
www.underlineabuse.sa.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.underlineabuse.sa.com
- URL
- https://www.underlineabuse.sa.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8804932c6f363a60
Verdicts & Comments Add Verdict or Comment
18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| _cf_chl_opt function| SCenv3 function| CsezId8 object| Obur6 object| CjrvC1 function| ngNOYa1 function| Ialy2 boolean| pVKt3 function| Njzo5 function| cvJR6 function| sXmGb8 object| eUKO1 number| eYgMt3 object| angular object| turnstile boolean| dTbYv5 string| hqeT32 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.underlineabuse.sa.com/ | Name: cf_chl_3 Value: ebf015cfe22c715 |
|
www.underlineabuse.sa.com/ | Name: cf_chl_rc_ni Value: 1 |
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
www.googletagmanager.com
www.underlineabuse.sa.com
www.underlineabuse.sa.com
104.17.2.184
104.17.3.184
172.67.211.19
2a00:1450:4001:82f::2008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